Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
2014-01-19T17:16:28.990
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:N/A:P
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | libtiff | libtiff | ≤ 4.0.2 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0 | Yes |
Application | libtiff | libtiff | 4.0.1 | Yes |